0xjet / bash-malware
A collection of beautified and commented samples of malware implemented in Bash
☆10Updated last year
Related projects ⓘ
Alternatives and complementary repositories for bash-malware
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- ☆27Updated 3 months ago
- ☆22Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- IoT Malware Similarity Analysis Platform☆44Updated 2 years ago
- Configuration Extractors for Malware☆54Updated last month
- Yet Another Memory Analyzer for malware detection☆24Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated 8 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆17Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- ☆29Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆17Updated 9 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- ☆18Updated 10 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆27Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 2 months ago
- ☆49Updated last year
- ☆17Updated 4 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆40Updated last year
- ☆12Updated 4 years ago
- ☆50Updated 7 months ago
- ☆10Updated 2 weeks ago